SIEM Reports

A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

Former Healthcare CIO Talks Cybersecurity in Healthcare
sponsored by Optum
EGUIDE: Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

Recovering From Ransomware Starts with a Data Protection Strategy
sponsored by Dell Software
EGUIDE: Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AT&T Cybersecurity

How to Improve SIEM Systems with Machine Learning
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, security expert Karen Scarfone dives into how machine learning can improve the effectiveness of SIEM systems.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell